Secure Architecture

serverless

Is it Safe to use Serverless Applications?

By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they...
virtualisation

Elevating security with virtualisation

By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may...
side-channel

Side-channel attacks

By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering...
Trusted-Security

Trusted security

How do you know that you are your mother's child? How can you be sure that the chef in that...